What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kazuhide Fukushima
Google Scholar
29
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
PenGym: Realistic training environment for reinforcement learning pentesting agents.
Huynh Phuong Thanh Nguyen
Kento Hasegawa
Kazuhide Fukushima
Razvan Beuran
2025
journals/cic
Diagonally dominant matrices for cryptography.
Andrea Lesavourey
Kazuhide Fukushima
Thomas Plantard
Arnaud Sipasseuth
2024
conf/acisp
Threshold Ring Signatures with Accountability.
Thanh Xuan Khuc
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2024
conf/acisp
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems.
Tuong Ngoc Nguyen
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2024
conf/provsec
Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions.
Thanh Xuan Khuc
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2023
journals/istr
Wildcarded identity-based ring signatures based on linearly homomorphic signatures.
Masahito Ishizaka
Kazuhide Fukushima
2023
conf/acisp
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications.
Masahito Ishizaka
Kazuhide Fukushima
2023
conf/acns
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence.
Hiroki Okada
Kazuhide Fukushima
Shinsaku Kiyomoto
Tsuyoshi Takagi
2023
conf/esorics
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
Ravi Anand
Subhadeep Banik
Andrea Caforio
Kazuhide Fukushima
Takanori Isobe
Shinsaku Kiyomoto
Fukang Liu
Yuto Nakano
Kosei Sakamoto
Nobuyuki Takeuchi
2022
conf/icisc
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding.
Masahito Ishizaka
Kazuhide Fukushima
Shinsaku Kiyomoto
2022
conf/icisc
Attribute-Based Signatures for Range of Inner Product and Its Applications.
Masahito Ishizaka
Kazuhide Fukushima
2022
conf/provsec
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices.
Priyanka Dutta
Dung Hoang Duong
Willy Susilo
Kazuhide Fukushima
Shinsaku Kiyomoto
2022
conf/esorics
Efficient Unique Ring Signatures from Lattices.
Tuong Ngoc Nguyen
Anh The Ta
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2022
conf/asiaccs
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security.
Priyanka Dutta
Mei Jiang
Dung Hoang Duong
Willy Susilo
Kazuhide Fukushima
Shinsaku Kiyomoto
2021
conf/acisp
Efficient Unique Ring Signature for Blockchain Privacy Protection.
Anh The Ta
Thanh Xuan Khuc
Tuong Ngoc Nguyen
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Kazuhide Fukushima
Shinsaku Kiyomoto
2021
conf/iwsec
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem.
Shusaku Uemura
Kazuhide Fukushima
Shinsaku Kiyomoto
Momonari Kudo
Tsuyoshi Takagi
2020
conf/icics
A Compact Digital Signature Scheme Based on the Module-LWR Problem.
Hiroki Okada
Atsushi Takayasu
Kazuhide Fukushima
Shinsaku Kiyomoto
Tsuyoshi Takagi
2019
conf/acisp
A Lattice-Based Public Key Encryption with Equality Test in Standard Model.
Dung Hoang Duong
Kazuhide Fukushima
Shinsaku Kiyomoto
Partha Sarathi Roy
Willy Susilo
2019
conf/wisa
Secret Sharing on Evolving Multi-level Access Structure.
Sabyasachi Dutta
Partha Sarathi Roy
Kazuhide Fukushima
Shinsaku Kiyomoto
Kouichi Sakurai
2018
conf/icisc
On the Complexity of the LWR-Solving BKW Algorithm.
Hiroki Okada
Atsushi Takayasu
Kazuhide Fukushima
Shinsaku Kiyomoto
Tsuyoshi Takagi
2017
conf/acns
An Experimental Study of the BDD Approach for the Search LWE Problem.
Rui Xu
Sze Ling Yeo
Kazuhide Fukushima
Tsuyoshi Takagi
Hwajung Seo
Shinsaku Kiyomoto
Matt Henricksen
2017
conf/eurosp
Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers.
Wataru Kawai
Rei Ueno
Naofumi Homma
Takafumi Aoki
Kazuhide Fukushima
Shinsaku Kiyomoto
2017
conf/host
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card.
Ye Yuan
Kazuhide Fukushima
Shinsaku Kiyomoto
Tsuyoshi Takagi
2013
conf/esorics
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Limin Jia
Jassim Aljuraidan
Elli Fragkaki
Lujo Bauer
Michael Stroucken
Kazuhide Fukushima
Shinsaku Kiyomoto
Yutaka Miyake
2011
conf/acns
Analysis of Message Injection in Stream Cipher-Based Hash Functions.
Yuto Nakano
Carlos Cid
Kazuhide Fukushima
Shinsaku Kiyomoto
2010
conf/iwsec
Efficient Implementation of Pairing on BREW Mobile Phones.
Tadashi Iyama
Shinsaku Kiyomoto
Kazuhide Fukushima
Toshiaki Tanaka
Tsuyoshi Takagi
2009
conf/sec
How to Bootstrap Security for Ad-Hoc Network: Revisited.
Wook Shin
Carl A. Gunter
Shinsaku Kiyomoto
Kazuhide Fukushima
Toshiaki Tanaka
2008
conf/wisa
Ternary Subset Difference Method and Its Quantitative Analysis.
Kazuhide Fukushima
Shinsaku Kiyomoto
Toshiaki Tanaka
Kouichi Sakurai
2003
conf/wisa
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation.
Kazuhide Fukushima
Kouichi Sakurai
Coauthors
Andrea Caforio
(1)
Andrea Lesavourey
(1)
Anh The Ta
(2)
Arnaud Sipasseuth
(1)
Atsushi Takayasu
(2)
Carl A. Gunter
(1)
Carlos Cid
(1)
Dung Hoang Duong
(8)
Elli Fragkaki
(1)
Fuchun Guo
(4)
Fukang Liu
(1)
Hiroki Okada
(3)
Huy Quoc Le
(2)
Huynh Phuong Thanh Nguyen
(1)
Hwajung Seo
(1)
Jassim Aljuraidan
(1)
Kazuhide Fukushima
(29)
Kento Hasegawa
(1)
Kosei Sakamoto
(1)
Kouichi Sakurai
(3)
Limin Jia
(1)
Lujo Bauer
(1)
Masahito Ishizaka
(4)
Matt Henricksen
(1)
Mei Jiang
(1)
Michael Stroucken
(1)
Momonari Kudo
(1)
Naofumi Homma
(1)
Nobuyuki Takeuchi
(1)
Partha Sarathi Roy
(2)
Priyanka Dutta
(2)
Ravi Anand
(1)
Razvan Beuran
(1)
Rei Ueno
(1)
Rui Xu
(1)
Sabyasachi Dutta
(1)
Shinsaku Kiyomoto
(23)
Shusaku Uemura
(1)
Subhadeep Banik
(1)
Sze Ling Yeo
(1)
Tadashi Iyama
(1)
Takafumi Aoki
(1)
Takanori Isobe
(1)
Thanh Xuan Khuc
(3)
Thomas Plantard
(1)
Toshiaki Tanaka
(3)
Tsuyoshi Takagi
(7)
Tuong Ngoc Nguyen
(3)
Wataru Kawai
(1)
Willy Susilo
(8)
Wook Shin
(1)
Ye Yuan
(1)
Yutaka Miyake
(1)
Yuto Nakano
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to